The Commercial Appeal

Bartlett Weekly Colliervil­le recovers from ransomware as other cities get hit

- Daniel Connolly Memphis Commercial Appeal USA TODAY NETWORK – TENNESSEE FILE PHOTO

Town officials in Colliervil­le realized in July that hackers had infiltrated the government’s computer system.

It soon became clear that the town had been targeted for a ransomware attack. Criminals locked up computer files using rogue software, then demand payment to unlock them. The computer attack on the small suburban government fits into a larger pattern that the FBI is warning the public about.

“And part of the reason of wanting to get the message out is we’re seeing it happen more and more to small municipali­ties, police department­s,” said Jeremy Baker, assistant special agent in charge for the Memphis office of the FBI. These smaller organizati­ons tend to have less funding and criminals see them as softer targets for ransomware, he said.

“And you can imagine if your local utility company gets hit with one of these, it might impact service, or the bills being generated, or the person who comes out to read your meter,” said Baker.

“It really can throw some of these municipali­ties or related companies or organizati­ons into a tailspin. We don’t think how much of our jobs involve the internet until it’s not there anymore, really. Or just basic files on our machines.”

He said he couldn’t provide statistics, but said the ransomware attacks on small institutio­ns appear to have picked up even as overall reports of ransomware have decreased nationwide. And he said he believes ransomware attacks also hit private individual­s.

The FBI says ransomware attacks have struck hospitals, school districts, state and local government­s, law enforcemen­t agencies and businesses.

Fedex was hit by a ransomware attack in May 2017, and a June 2017 attack against its European-based TNT division led to $300 million in lost revenue, the BBC reported.

In December alone, ransomware attacks were reported against government­s in Galt, California,st. Lucie, Florida, Pensacola, Florida as well as New Orleans, CBS News reported.

Fortunatel­y, people can stop many of these attacks through steps such as training employees not to click on links in questionab­le emails, updating software and by properly backing up files, Baker said.

“If people do those few basic steps that we just walked you through, they’re going to be much safer,” he said.

The story of how Colliervil­le responded to the ransomware attack illustrate­s the threat and how to reduce the risk.

Colliervil­le under cyberattac­k

The ransomware attack on Colliervil­le was discovered on the morning of July 18, town officials have said.

“With ransomware of the type, the attacker leaves a calling card on the infected machines. This was an HTML file written as a ransom wrote. In this case, the note only had email addresses, no demands,” the town’s Informatio­n Technology Project Manager Don Petrowski, wrote in a joint email to The Commercial Appeal with Kate Watkins, the town finance official whose department oversees computer systems.

The ransomware attack hit most of the town’s Microsoft servers and froze files across multiple town department­s. Suddenly, files in common formats such as Microsoft Word didn’t work, said town spokeswoma­n Jennifer W. Casey. For her, that meant news releases she had saved were inaccessib­le.

Elsewhere in the town government, documents such as police reports and utility bills were frozen, she said.

Fighting back

“In our case, the news media was airing informatio­n on the attack before we could fully assess the full range of the attack,” the town officials wrote. “Both the FBI and Secret Service contacted us within hours of hearing the coverage.”

Town administra­tor James Lewellen said the town government never contacted the cybercrimi­nals and never received a ransom demand for a specific amount of money.

Instead, the informatio­n technology managers began trying to undo the hackers’ work and recover the files “to figure out if they could outsmart the code, and try to decrypt what they put on there and just steal ‘em back, so to speak,” Lewellen said.

But those decryption efforts didn’t work. The town officials soon began restoring the locked files from a backup system, and the informatio­n technology staff worked around the clock, he said.

“To get it all back up and running, we went through a period of about six weeks. We recovered in stages,” Lewellen said.

The town missed a couple of utility billing cycles, he said, but they never paid a ransom.

Lessons learned

Both the FBI agent and the Colliervil­le

FBI tips for preventing ransomware attacks

People should avoid clicking on links or download files in unsolicite­d emails that appear suspicious. Institutio­ns should train employees on what to look out for.

Make secure backups of files and keep the material stored separately from the main computer system.

Update software regularly. Hackers are always looking for weaknesses in computer systems, and software updates help close loopholes.

If you are a victim of a ransomware attack, call the Memphis FBI office at 747-4300 as well as the Secret Service at 544-0333. You may also report the incident online at Ic3.gov.

officials emphasized the importance of making backups - particular­ly those that are separate from the main computer system and can’t be infected through a ransomware attack.

If an institutio­n has good backups, it can ignore the ransom demand and set about restoring its system, as Colliervil­le did.

The FBI agent and Colliervil­le town officials also emphasized the importance of training employees to watch out for suspicious emails.

In many cases, hackers dangle an offer of money to entice people to click on a link or download a file that infects a computer system with malicious software, said the FBI agent.

“So if you get an email that says ‘click here to claim your prize, click here for a free gift card.’ Things where your gut sort of tells you ‘this is probably too good to be true,’” Baker said.

The Colliervil­le officials believe the hackers got access to the town’s computer system through some type of phishing email, though Petrowski and Watkins said they could never confirm this.

Should you pay a ransom?

Many of the people who carry out ransomware attacks are living somewhere outside the United States, particular­ly in Russia and Eastern Europe, said Baker, and they’re constantly changing tactics to exploit weaknesses in computer systems. He recommends keeping software up to date to close loopholes.

But if a cybercrimi­nal has somehow slipped past your defenses, encrypted your files and is demanding a ransom, should you pay it?

The FBI has seen cases in which a person paid a ransom, the files were not unlocked and the criminal then demanded another ransom - and cases in which the criminal promised to unlock the whole system but only certain files were unlocked, he said.

Investigat­ive reporter Daniel Connolly welcomes tips and comments from the public. Reach him at 529-5296, daniel.connolly@commercia lappeal.com, or on Twitter at @daniel connolly.

 ??  ??
 ??  ?? A programmer shows a sample of a “ransomware” cyberattac­k on a laptop.
A programmer shows a sample of a “ransomware” cyberattac­k on a laptop.

Newspapers in English

Newspapers from United States